Abstract of Mobile Based Marketing System Using Privacy and Se
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 99

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

A Mobile location-based service (LBS) is a software application for a mobile device that requires knowledge about where the mobile device is located. Mobile location-based services use the geographic location of a personal handset such as a personal digital assistant (PDA), smart phone or navigation device either to enhance existing applications or to enable new applications. The consolidated utilization of wireless communication technology, location determination, geo-data frameworks and cell phones opens the best approach to create new or enhanced data, excitement, informal communication, individual route, mapping, geo-promoting, security, and law implementation following administrations, among others. Because of location sensitive system user can cheat about their current location and access restricted resources which will be harmful in mobile location based system. To preserve privacy and security, each mobile has pseudonyms are to protect source location privacy from each other which are periodically changeable with respect to specific condition and from the untrusted location proof server. In new proposed system mobile user can get identity and certificate from Trusted Third Party. Then mobile user can collect token from Token Distributor which will be act as virtual currency. And token collector can redeem the tokens from mobile user.

Keywords: Mobile location-based services, security, privacy, Trusted Third Party, Mobile Users, Token Distributors, Token Collectors, Central Controller

Edition: Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Share this Article

How to Cite this Article?

Digvijay A. Patil, Yogesh B. Gurav, "Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14719, Volume 3 Issue 12, December 2014, 1486 - 1489

Enter Your Email Address


Similar Articles with Keyword 'security'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'privacy'

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'Trusted Third Party'

Downloads: 101

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1415 - 1419

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Shivani Bhatia, Rekha Saraswat

Share this Article

Similar Articles with Keyword 'Mobile Users'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2591 - 2595

DASU: High Quality Video Streaming Over Multiple Wireless Access Network Using Real Time Adaptive Algorithm

Prathibha T P

Share this Article

Similar Articles with Keyword 'Token Distributors'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Downloads: 123

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 709 - 713

Secured Location-Based Rewarding System Using Digital Signature (SLBRDS)

Rubina Ashfaque Shah, Dr. Rahat Khan

Share this Article

Similar Articles with Keyword 'Token Collectors'

Downloads: 106

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Downloads: 123

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 709 - 713

Secured Location-Based Rewarding System Using Digital Signature (SLBRDS)

Rubina Ashfaque Shah, Dr. Rahat Khan

Share this Article

Similar Articles with Keyword 'Mobile'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Similar Articles with Keyword 'services'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article
Top